Analysis

  • max time kernel
    1830s
  • max time network
    1850s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 20:43

General

  • Target

    Stargate Simulator/Engine/Stargate Simulator/Stargate Simulator.xml

  • Size

    12KB

  • MD5

    cbe1a4a64a7b6cb5cb12d896bc0e3d55

  • SHA1

    16d8aa95cdbb4bbc54dc0abe9e92a8e490ff4217

  • SHA256

    86be563ae5b91f5006ee08bfdb0dd67cf586ef71518e2adc97546c463b314497

  • SHA512

    f873f8ac2152651355be104324a8c968629960a9b0cb3747c08c32121b5c2dfb8ba6d71d0cc9bb47f79b61724ab7e5dcdfe95797e4316be577458311a8419af9

  • SSDEEP

    192:e/zcNtqK/nPcV/nPcN8nPcJEFj/nPcFycn:G4F/PU/P08PiEFj/Poycn

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE" /verb open "C:\Users\Admin\AppData\Local\Temp\Stargate Simulator\Engine\Stargate Simulator\Stargate Simulator.xml"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Program Files (x86)\Internet Explorer\iexplore.exe
      "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -nohome
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE" -nohome
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2008 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1832

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\X0KHYSZ1.txt

    Filesize

    603B

    MD5

    abc6fb4868581de8ed1d7afd03ddb391

    SHA1

    3a78a5249861d1f799cfa3327ac06dc898ed4eaf

    SHA256

    01c4703d96e3403e74187f610868b5dafe208e40c33f2eadbaf959bc0ae6c298

    SHA512

    bc5229d8f4ccd5bd75ddeddcc2bd1fbfe76d6894f5f3fb49838e5c5c0663cedcfc528a4a8d8089a20ab604d08b0e1bc181153aabb851ac1d9ce2df25b8307a91

  • memory/1292-54-0x0000000075B41000-0x0000000075B43000-memory.dmp

    Filesize

    8KB